[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
๐ฌStatic Analysis
Flag this post
The Best Smart Water-Leak Detector
nytimes.comยท9h
๐Security
Flag this post
I reverse engineered my cheap managed switch's firmware
xda-developers.comยท1d
๐Browser Exploitation
Flag this post
Screening Without Tagging
science.orgยท9h
๐Fuzzing
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Appleโs Binaries
๐ฅExploit Development
Flag this post
A Deep Dive into the Morris Worm
๐ฅExploit Development
Flag this post
<p>**Abstract:** This paper introduces a novel framework for automated, high-resolution longitudinal analysis of micro-structural changes in composite materials...
freederia.comยท2h
๐ฆRust
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comยท1h
๐Browser Exploitation
Flag this post
An introduction to program synthesis (Part II) - Automatically generating features for machine learning
๐ฌStatic Analysis
Flag this post
Announcing Magika 1.0: now faster, smarter, and rebuilt in Rust
blogger.comยท8h
๐ฆRust
Flag this post
Peeling Back the Plastic: Finding 0-Days in IoT Devices
bishopfox.comยท14h
๐Browser Exploitation
Flag this post
Puran File Recovery Portable 2.0
majorgeeks.comยท14h
๐Browser Exploitation
Flag this post
Evaluating digital forensic findings in Trojan horse defense cases using Bayesian networks
sciencedirect.comยท18h
๐ฅExploit Development
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐ฅExploit Development
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.comยท3d
๐Browser Exploitation
Flag this post
Louvre Jewel Heist Reveals Decades of Cybersecurity Failures
windowsforum.comยท21h
๐Security
Flag this post
Loading...Loading more...